Create an Account
username: password:
 
  MemeStreams Logo

MemeStreams Discussion

search


This page contains all of the posts and discussion on MemeStreams referencing the following web page: paper: Wireless LAN Location-Sensing for Security Applications. You can find discussions on MemeStreams as you surf the web, even if you aren't a MemeStreams member, using the Threads Bookmarklet.

paper: Wireless LAN Location-Sensing for Security Applications
by jlang at 1:20 pm EDT, Sep 18, 2003

Abstract
This paper considers the problem of using wireless LAN location-sensing for security applications. Recently, Bayesian methods have been successfully used to determine location from wireless LAN signals, but such methods have the drawback that a model must first be built from training data. The introduction of model error can drastically reduce the robustness of the location estimates and such errors can be actively induced by malicious users intent on hiding their location. This paper provides a technique for increasing robustness in the face of model error and experimentally validates this technique by testing against unmodeled hardware, modulation of power levels, and the placement of devices outside the trained workspace. Our results have interesting ramifications for location privacy in wireless networks.


 
RE: paper: Wireless LAN Location-Sensing for Security Applications
by Abaddon at 10:12 am EDT, Sep 19, 2003

JLang wrote:
] Abstract
] This paper considers the problem of using wireless LAN
] location-sensing for security applications. Recently, Bayesian
] methods have been successfully used to determine location from
] wireless LAN signals, but such methods have the drawback that
] a model must first be built from training data. The
] introduction of model error can drastically reduce the
] robustness of the location estimates and such errors can be
] actively induced by malicious users intent on hiding their
] location. This paper provides a technique for increasing
] robustness in the face of model error and experimentally
] validates this technique by testing against unmodeled
] hardware, modulation of power levels, and the placement of
] devices outside the trained workspace. Our results have
] interesting ramifications for location privacy in wireless
] networks.

We've actually done this at my work (AirDefense Inc.) and expect it to be in QA probably by Q1 of next year...its not that hard to train it if the system is clever about how it uses the data...

--Abaddon


There is a redundant post from Decius not displayed in this view.
 
 
Powered By Industrial Memetics